All Stories

  1. The Threat of Deepfake Fingerprints
  2. PEAS: A Strategy for Crafting Transferable Adversarial Examples
  3. Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks.
  4. Back-in-Time Diffusion: Unsupervised Detection of Medical Deepfakes
  5. Discussion Paper: Exploiting LLMs for Scam Automation: A Looming Threat
  6. Ranking the Transferability of Adversarial Examples
  7. Deepfake CAPTCHA: A Method for Preventing Fake Calls
  8. Discussion Paper: The Threat of Real Time Deepfakes